You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/detect-windows-endpoints-script.md
+33-11Lines changed: 33 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,25 +45,24 @@ The script described in this article is supported for the following Windows oper
45
45
46
46
## Download the script
47
47
48
-
Offline WMI
49
-
To preform offline WMI complete the following steps:
50
-
1. Download the script, extract it and run 'run.bat' as administrator directly on the Windows endpoint
51
-
2. Import the received output file to the sensor - cx_snapshot_[machinename]_[current date time].
52
-
3. In Data mining's Devices applications report, you can view the device applications.
53
-
4. Based on this information, the Windows device CVE list will be displayed in Azure if the sensor is cloud-connected
48
+
In order to run the script, you first need to download it from the OT sensor console.
54
49
55
-
:::image type="content" source="media/detect-windows-endpoints-script/download-wmi-script.png" alt-text="Screenshot of where to download WMI script." lightbox="media/detect-windows-endpoint-script/download-wmi-script.png":::
50
+
1. Sign into your OT sensor console, and select **System Settings** > **Import Settings** > **Windows Information**.
51
+
52
+
1. Select **Download script**.
53
+
54
+
:::image type="content" source="media/detect-windows-endpoints-script/download-wmi-script.png" alt-text="Screenshot of where to download WMI script." lightbox="media/detect-windows-endpoint-script/download-wmi-script.png":::
56
55
57
56
## Run the script
58
57
59
-
This procedure describes how to obtain, deploy, and run the script on the Windows workstation and servers that you want to monitor in Defender for IoT.
58
+
This procedure describes how to deploy and run the script on the Windows workstation and servers that you want to monitor in Defender for IoT.
60
59
61
60
The script you run to detect enriched Windows data is run as a utility and not as an installed program. Running the script doesn't affect the endpoint.
62
61
63
-
1. To acquire the script, [contact customer support](mailto:support.microsoft.com).
64
-
65
62
1. Deploy the script once, or using ongoing automation, using standard automated deployment methods and tools.
66
63
64
+
1. Download the WMI script as described [earlier](#download-the-script).
65
+
67
66
1. Copy the script to a local drive and unzip it. The following files appear:
68
67
69
68
-`start.bat`
@@ -95,11 +94,34 @@ After having run the script as described [earlier](#run-the-script), import the
95
94
96
95
1. Select **Import File**, and then select all the files (Ctrl+A).
97
96
97
+
:::image type="content" source="media/detect-windows-endpoints-script/import-wmi-script.png" alt-text="Screenshot of where to import WMI script." lightbox="media/detect-windows-endpoint-script/import-wmi-script.png":::
98
+
98
99
1. Select **Close**. The device registry information is imported and a successful confirmation message is shown.
99
100
100
101
If there's a problem uploading one of the files, you'll be informed which file upload failed.
101
102
103
+
## Offline WMI
104
+
105
+
To preform offline WMI:
106
+
107
+
1.[Download the script](#download-the-script), then extract it.
108
+
109
+
1. Run `run.bat` as administrator directly on the Windows endpoint.
110
+
111
+
After the script runs to probe the registry, a CX-snapshot file appears with the registry information. The filename indicates the machine name and the current date and time of the snapshot with the following syntax: `cx_snapshot_[machinename]_[current date time]`.
112
+
113
+
1.[Import](#import-device-details) the received output file to the sensor.
114
+
115
+
**To view the devices applications:**
116
+
117
+
1. Sign into your OT sensor console, and select **Data mining**.
118
+
119
+
1. Select **+ Create report** to [create a custom report](how-to-create-data-mining-queries.md#create-an-ot-sensor-custom-data-mining-report). In the **Choose Category** field, select **Devices Applications**. For example:
120
+
121
+
:::image type="content" source="media/detect-windows-endpoints-script/devices-applications-report.png" alt-text="Screenshot of where to import WMI script." lightbox="media/detect-windows-endpoint-script/devices-applications-report.png":::
122
+
123
+
Based on this information, the Windows device CVE list will be displayed in Azure if the sensor is cloud-connected.
124
+
102
125
## Next steps
103
126
104
127
For more information, see [Detect Windows workstations and servers with a local script](detect-windows-endpoints-script.md) and [Import extra data for detected OT devices](how-to-import-device-information.md).
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-work-with-the-sensor-device-map.md
+6-13Lines changed: 6 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ To view devices across multiple sensors in a zone, you'll also need an on-premis
31
31
- Starred devices are those that had been marked as important
32
32
- Devices with no alerts are shown in black, or grey in the zoomed-in connections view
33
33
34
-
For example:
34
+
For example:
35
35
36
36
:::image type="content" source="media/how-to-work-with-maps/device-map-default.png" alt-text="Screenshot of a default view of an OT sensor's device map." lightbox="media/how-to-work-with-maps/device-map-default.png":::
37
37
@@ -45,7 +45,7 @@ To view devices across multiple sensors in a zone, you'll also need an on-premis
45
45
- The number of devices grouped in a subnet in an IT network, if relevant. This number of devices is shown in a black circle.
46
46
- Whether the device is newly detected or unauthorized.
47
47
48
-
1. Right-click a specific device and select **View properties** to drill down further to the **Map View** tab on the device's [device details page](how-to-investigate-sensor-detections-in-a-device-inventory.md#view-the-device-inventory).
48
+
1. Right-click a specific device and select **View properties** to drill down further to the **Map View** tab on the device's [device details page](how-to-investigate-sensor-detections-in-a-device-inventory.md#view-the-device-inventory).
49
49
50
50
### Modify the OT sensor map display
51
51
@@ -73,7 +73,6 @@ To see device details, select a device and expand the device details pane on the
73
73
- Select **Event Timeline** to jump to the device's [event timeline](how-to-track-sensor-activity.md)
74
74
- Select **Device Details** to jump to a full [device details page](how-to-investigate-sensor-detections-in-a-device-inventory.md#view-the-device-inventory).
75
75
76
-
77
76
### View IT subnets from an OT sensor device map
78
77
79
78
By default, IT devices are automatically aggregated by [subnet](how-to-control-what-traffic-is-monitored.md#define-ot-and-iot-subnets), so that the map focuses on your local OT and IoT networks.
@@ -94,7 +93,6 @@ By default, IT devices are automatically aggregated by [subnet](how-to-control-w
94
93
1. Sign into your OT sensor and select **Device map**.
95
94
1. Select one or more expanded subnets and then select **Collapse All**.
96
95
97
-
98
96
## Create a custom device group
99
97
100
98
In addition to OT sensor's [built-in device groups](#built-in-device-map-groups), create new custom groups as needed to use when highlighting or filtering devices on the map.
@@ -103,7 +101,7 @@ In addition to OT sensor's [built-in device groups](#built-in-device-map-groups)
103
101
104
102
1. In the **Add custom group** pane:
105
103
106
-
- In the **Name** field, enter a meaningful name for your group, with up to 30 characters.
104
+
- In the **Name** field, enter a meaningful name for your group, with up to 30 characters.
107
105
- From the **Copy from groups** menu, select any groups you want to copy devices from.
108
106
- From the **Devices** menu, select any extra devices to add to your group.
109
107
@@ -113,12 +111,11 @@ Use one of the following options to import and export device data:
113
111
114
112
-**Import Devices**. Select to import devices from a pre-configured .CSV file.
115
113
-**Export Devices**. Select to export all currently displayed devices, with full details, to a .CSV file.
116
-
-**Export Device Summary**. Select to export a high level summary of all currently displayed devices to a .CSV file.
117
-
114
+
-**Export Device Summary**. Select to export a high level summary of all currently displayed devices to a .CSV file.
118
115
119
116
## Edit devices
120
117
121
-
1. Sign into an OT sensor and select **Device map**.
118
+
1. Sign into an OT sensor and select **Device map**.
122
119
123
120
1. Right-click a device to open the device options menu, and then select any of the following options:
124
121
@@ -142,13 +139,12 @@ You can only merge [authorized devices](device-inventory.md#unauthorized-devices
142
139
143
140
> [!IMPORTANT]
144
141
> You can't undo a device merge. If you mistakenly merged two devices, delete the devices and then wait for the sensor to rediscover both.
145
-
>
146
142
147
143
**To merge multiple devices**:
148
144
149
145
1. Sign into your OT sensor and select **Device map**.
150
146
151
-
1. Select the authorized devices you want to merge by using the SHIFT key to select more than one device, and then right-click and select **Merge**.
147
+
1. Select the authorized devices you want to merge by using the SHIFT key to select more than one device, and then right-click and select **Merge**.
152
148
153
149
1. At the prompt, select **Confirm** to confirm that you want to merge the devices.
154
150
@@ -189,7 +185,6 @@ You may have situations where you'd want to handle multiple notifications togeth
189
185
190
186
When you handle multiple notifications together, you may still have remaining notifications that need to be handled manually, such as for new IP addresses or no subnets detected.
191
187
192
-
193
188
### Device notification responses
194
189
195
190
The following table lists available responses for each notification, and when we recommend using each one:
@@ -233,7 +228,6 @@ On the on-premises management console, zone maps show all network elements relat
233
228
234
229
1. Right-click a device shown in red and select **View alerts** to jump to the **Alerts page**, with alerts filtered only for the selected device.
235
230
236
-
237
231
## Built-in device map groups
238
232
239
233
The following table lists the device groups available out-of-the-box on the OT sensor **Device map** page. [Create extra, custom groups](#create-a-custom-device-group) as needed for your organization.
@@ -257,4 +251,3 @@ The following table lists the device groups available out-of-the-box on the OT s
257
251
## Next steps
258
252
259
253
For more information, see [Investigate sensor detections in a Device Inventory](how-to-investigate-sensor-detections-in-a-device-inventory.md).
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/release-notes.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,7 +101,9 @@ To understand whether a feature is supported in your sensor version, check the r
101
101
102
102
**Supported until**: 03/2024
103
103
104
-
- add items here
104
+
-[Download WMI script from OT sensor console](detect-windows-endpoints-script.md#download-the-script)
105
+
-[Automatically resolved notifications for operating system changes and device type changes](how-to-work-with-the-sensor-device-map.md#device-notification-responses)
106
+
-[UI enhancements when uploading SSL/TLS certificates](how-to-deploy-certificates.md#deploy-a-certificate-on-an-ot-sensor)
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/whats-new.md
+21-1Lines changed: 21 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,27 @@ Features released earlier than nine months ago are described in the [What's new
20
20
21
21
|Service area |Updates |
22
22
|---------|---------|
23
-
|**OT networks**|**Sensor version 22.3.8**: <br>- add items here |
23
+
|**OT networks**|**Sensor version 22.3.8**: <br>- [Download WMI script from OT sensor console](#download-wmi-script-from-ot-sensor-console) <br>- [Automatically resolved OS and device type notifications](#automatically-resolved-os-and-device-type-notifications) <br>- [UI enhancement when uploading SSL/TLS certificates](#ui-enhancement-when-uploading-ssltls-certificates)|
24
+
25
+
### Download WMI script from OT sensor console
26
+
27
+
The WMI script can now be downloaded from the OT sensor console.
28
+
29
+
For more information, see [Download the script](detect-windows-endpoints-script.md#download-the-script)
30
+
31
+
### Automatically resolved OS and device type notifications
32
+
33
+
Starting in version 22.3.8, selected notifications on the OT sensor's **Device map** page are now automatically resolved if they aren't dismissed or otherwise handled within 14 days.
34
+
35
+
After updating your sensor version, the **Operating system changes** and **Device type changes** notifications no longer appear.
36
+
37
+
For more information, see [Device notification responses](how-to-work-with-the-sensor-device-map.md#device-notification-responses)
38
+
39
+
### UI enhancement when uploading SSL/TLS certificates
40
+
41
+
The OT sensor version 22.3.8 has an enhanced **SSL/TLS Certificates** configuration page for defining your SSL/TLS certificate settings and deploying a CA-signed certificate.
42
+
43
+
For more information, see [Deploy a certificate on an OT sensor](how-to-deploy-certificates.md#deploy-a-certificate-on-an-ot-sensor).
0 commit comments